Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 10:46

General

  • Target

    183cc5406314f67b15a424162da1e431.exe

  • Size

    208KB

  • MD5

    183cc5406314f67b15a424162da1e431

  • SHA1

    a6dc2b382023ccac71f87bfc3e80b013b0fd458f

  • SHA256

    ec073d73d54a52d889115abe7a08088f2fe16c0cf1186078b43a0f79a6db155c

  • SHA512

    a3437e66c622c07ca0bb6aaf1bea4ce7160bcf97976be84fef41cae8d5815b7f055765e5ac73c2b022e1f33b88261a5faa795597df1ad2ebb06384ad4e950582

  • SSDEEP

    3072:8VHgCc4xGvbwcU9KQ2BBAHmaPxiVoIb5ET:5Cc4xGxWKQ2Bonxb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\183cc5406314f67b15a424162da1e431.exe
    "C:\Users\Admin\AppData\Local\Temp\183cc5406314f67b15a424162da1e431.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\334bc1a9\jusched.exe
      "C:\Program Files (x86)\334bc1a9\jusched.exe"
      2⤵
      • Executes dropped EXE
      PID:2280

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\334bc1a9\334bc1a9

          Filesize

          17B

          MD5

          134c1d489094d6d3399f65b0e9aebc1f

          SHA1

          612a57fbe6ed3ab9c15b39451171d813314a28d5

          SHA256

          54f9150d1268f7b4b83dd9fc3ec32274bf749715a5806ff3ca5262f5427d6781

          SHA512

          b09bf60e4850d05261d81a124a647dd111f42480224eae8a3bd2f64736c38119953703f868ad34194a7ae6dad6aabff4081ba73df262bbe9f5327867c56a48ed

        • \Program Files (x86)\334bc1a9\jusched.exe

          Filesize

          208KB

          MD5

          bc4ae47d6aa4e73287ba4d36810aa830

          SHA1

          30affefd785ebc5d1ab51b749669a06e8f107bb6

          SHA256

          006f2cd2e2ac0a5d2b7a1fd6f56b6a4af8dc7e6c400f881750bc30277323b7a8

          SHA512

          c7b5fbfa3c81e066fc00a9d8216dd19ee845a900d74c2c2f44f3d9ff6ace11e242ff8845c162dce6e4e0db3f7137b607fde19f5854e0fe9545c5d142bb3476a2

        • memory/2020-0-0x0000000000400000-0x0000000000456000-memory.dmp

          Filesize

          344KB

        • memory/2020-6-0x0000000001FB0000-0x0000000002006000-memory.dmp

          Filesize

          344KB

        • memory/2020-14-0x0000000000400000-0x0000000000456000-memory.dmp

          Filesize

          344KB

        • memory/2020-13-0x0000000001FB0000-0x0000000002006000-memory.dmp

          Filesize

          344KB

        • memory/2280-15-0x0000000000400000-0x0000000000456000-memory.dmp

          Filesize

          344KB